Requesting some knowledgeable anons to lay out the basics of maintaining anonymity on the webs, both surface and dark, for less than educated n00bs. General instruction of how one might seek legal but (((forbidden))) information without winding up on a list somewhere

>There is no such thing as a trustworthy VPN. No VPN owner is going to go to prison for you.

Yes & No. VPN owners can fuck you without you noticing. That's the real issue - there is no reason to trust them being honest. VPN owners however don't have to sacrifice your ass to save themself from the gov. It just means running a system that leaves no logs so the owner can fully cooperate and still hand out nothing.

>Apple CEO Tim Cook further condemned white supremacists when he accepted an award from the (((Anti-Defamation League))) at an event in New York on Monday. The ADL honored Cook with its first ever Courage Against Hate Award, and the tech CEO took his time on the stage to address Apple's stance against hate speech and what he thinks are tech companies' responsibilities to customers.

>"From the earliest days of iTunes to Apple Music today, we have always prohibited music with a message of white supremacy," Cook said. "Why? Because it’s the right thing to do. And as we showed this year, we won’t give a platform to violent conspiracy theorists on the App Store."

You can downscale the CPU frequency when compiling so it doesn't get too hot and just leave it overnight during the installation of large packages and large updates.

Assuming you're updating at least once every week or two, you'll only have a few packages to compile per update, which shouldn't take long at all (assuming one of those isn't something mega huge like GCC, a web browser or LibreOffice).

You don't need to compile some huge programs like Firefox and LibreOffice on your machine if you don't have to btw, since Gentoo offers binary versions of those.

Done it on with an intel atom, just make sure your make_opts has the correct setting. I didn't pay attention the first time I installed and had it set to -j2 when it's supposed to be -j3 and then compiling didn't take nearly as long.

Linux on DeX Beta can turn your Samsung Galaxy smartphone or tablet into an Ubuntu desktop

By Brian Fagioli

>As Microsoft continues to sully the reputation of Windows 10 with buggy releases and other failures, Linux continues to be a great alternative. Slowly but steadily, consumers are starting to realize Windows isn't necessary anymore. Hell, if Microsoft no longer cares about quality, and is satisfied to release deficient operating system updates, why does it deserve our money and attention?

>Linux is great because operating systems based on it can adapt to various hardware configurations -- from meager low-powered computers to hardcore gaming PCs. Android phones are Linux-based, so it should not be surprising that Samsung is keen on transforming some of its Galaxy phones and tablets into makeshift Ubuntu desktops with the use of hardware docks and its DeX software. Called "Linux on DeX," it was announced last year (as "Linux on Galaxy"), but you can now finally sign up to beta test it.

>"When it was first demoed at last year’s Samsung Developer Conference in San Francisco, Linux on DeX generated significant buzz within the developer community by presenting a simple and convenient way to use Samsung DeX to build apps within a Linux development environment. The combination of Samsung DeX and the Linux on DeX app adds new levels of flexibility to developers’ work by allowing them to connect their Galaxy device [Note 9 and Tab S4 for now] to a monitor using just an HDMI adapter, and instantly enjoy a fuller computing experience when on the go," says Samsung.

>The Galaxy-maker further explains, "Linux on DeX frees developers from their desks by allowing them to access a PC-like Linux development environment anytime, anywhere. The app enables them to work on both Android and Ubuntu-based Linux distributions. Samsung provides a modified version of Ubuntu for Linux on DeX users, and has been working closely with Canonical, the company behind Ubuntu, to provide the best experience."

>Even though cloud storage is ubiquitous these days, I still love a good ol' USB flash drive. They are great for installing various Linux distributions -- it is handy to have, say, Fedora and Ubuntu install media ready to go. But also, sometimes -- for various reasons -- you may just need to share files offline.

>Today, ADATA launches a beautiful new USB Type-A flash drive. Called "UE700 Pro," it is very fast and slim. It features a retractable design, which I prefer -- there is no cap to lose. Best of all, it is offered in capacities up to 256GB.

>"Employing USB 3.1 the UE700 Pro sports fast read/write speeds of up to 360/180MB per second. That means users can transfer a 4GB high-resolution movie file in a speedy 22 seconds . Also, in an era of 4K videos, there can never be too much storage capacity. Therefore the UE700 comes with up to 256GB of storage capacity so users can capture hi-res photos and videos without fear of running out of space," says ADATA.

>The company further says, "The drive features a capless design where the USB connector is concealed in a compact body, fully protected without the need for a drive cap. A simple thumb swipe forward makes it ready to use, and the reverse motion stows the connector for storage or travel. What’s more, it sports an ultra-thin 7mm form factor and an elegant brushed aluminum surface that highlights the sleek concentric lines that emanate from the beautiful blue LED indicator. A lanyard hole offers convenience and personalization allowing users to attach the UE700 Pro to a lanyard or keychain for easy carrying, or accessorizing."

This is an interactive machine code development environment I've created. The basic idea is each key of the keyboard, decided by position rather than value, is bound to a routine which asks questions until an action can be decided upon. An example is pressing a key for a routine that merely needs two registers in order to complete; you're permitted to enter a register number, the tool won't allow invalid such numbers to be entered at all, it asks again in the same way, and it then writes the finished instruction to the current location; if a name referring to a number was used, that name will likely be displayed instead of the numerical value, varying, and any changes to the name will update the instruction as well.

I wrote this tool in Common Lisp purely because Common Lisp has the necessary primitives. The program is decidedly non-Lispy. I'm planning to write a simpler reimplementation in Ada by the year's end and expect this will be the version that is distributed to package managers and whatnot. Some simple figuring has shown to me that the memory usage for this program, sans any undo and redo mechanism, should be well within an eighth of a megabyte in the general case and below a quarter in all cases.

The tool was borne of my dislike for assemblers. Answers are saved by similar routines and so you can very easily press keys until you find the one you need; you can't touch and feel your way around an assembler. Aside from this, there are also special routines, primarily located on the home row, which control movement, insertion, deletion, jumping around the program space, creating and deleting names, and other necessitiPost too long. Click here to view the full text.

>i'm hoping to have some sort of 1337 optimizations by taking machine code into consideration, like having code jump into the middle of other instructions and such (assuming that's even useful on a modern superscalar processor)

I wouldn't know about speed, but it can be more memory efficient, certainly. I've dealt with a lax range model in my tool, where you can jump to the middle of an instruction and it will disassemble from there, but there are also some oddities with this model I won't go into much detail on. I'm expecting to use a much more structured range model in the simpler reimplementation, while still allowing one to split instructions into pieces and then re-piece them offset if wanted.

In any case, there's still no replacement for knowing the machine code well enough to know that you lack a non-negotiable part of an instruction and can't change the code to accommodate this and so must look elsewhere. It seems to be a common thread that it's easier to use code as data than data as code or offset code as code, but all of these are still so very interesting.

>What is the reason for re-writing it from Common Lisp to Ada? Just as an exercise for you, or is there a practical reason?

It's both. I'm learning Ada and this will be a good first project. I'm also wanting to make the program very resilient in many ways and Ada has facilities for this that standard Common Lisp lacks.

Common Lisp has STORAGE-CONDITION, but you can't really handle it in a perfectly portable way. The MMC will allocate in two main instances: when instating a file and with regards to the undo and redo system; there is another case where names can be dynamically allocated to avoid storing thousands of them and wasting memory. I'd like the MMC to be resilient against memory exhaustion errors. I'd also like to bPost too long. Click here to view the full text.

I would've preferred to have purely text and have the reader step along in my tool, but that's unreasonable at the moment, so what I do is I take the output of my tool and write around it. I have ASCII versions of the articles with ECMA-48 color codes and the versions that I've directly linked to, which are the ASCII versions translated to HTML.

These are the only three I've done so far, but there's four more I have to document before I've exhausted all of those in VIPER magazine. Then there's still documenting my own programs, of course.

I was originally vehemently opposed to making the output of the tool able to be taken and used statically in this fashion, but lately I've been considering a mode that would make the tool itself perform a batch process of outputting its display in perhaps TeX or something or another.

I no longer believe I'll necessarily have any work on the Ada reimplementation finished before the end of this year, but I do expect to finish most of the book, having already read more than half, and so be reasonably competent to do so at the year's beginning.

I did spend a day in which I'd try to reimplement it simpler in Common Lisp and see if I could get that done in a day and if so use that for a tad, but I didn't.

FreeDOS is pretty cool. Even MS-DOS 6.22 is pretty decent as are other DOSes. They frustrate me less than setting up linux, thats for sure.

I'm actually considering building a DOS machine, and currently I'm looking into networking with DOS. You can get these online with a bit of work. In a VM I got freeDOS online and used dillo and links for the Web. Gopher works as well. Telnet also works, which is nice to connect to BBSs. I'm still trying to sort out dosssh and ircjr which are SSH and IRC programs respectively.

No. You can at least ignore the OOP meme in Python and its memory usage is a fraction of what a JVM uses. And as mush as I hate Python for its slowness (and head-in-the-sand approach to lack of performances) and C++-like lack of overarching design (and now BDFL), it's actually readable, unlike Jabba the hutt.

No. You can at least ignore the OOP meme in Python and its memory usage is a fraction of what a JVM uses. And as mush as I hate Python for its slowness (and head-in-the-sand approach to lack of performances) and C++-like lack of overarching design (and now BDFL), it's actually readable, unlike Jabba the hutt.

>OK, so something that would simply be considered in some quarters as bad language isn't explicitly banned. The thing which differentiates simple bad language from "abusive, offensive or degrading language", which is called out by the CoC, is the context and the target. So when it's a simple expletive or the code of the author or even the hardware is the target, I'd say it's an easy determination it's not a CoC violation. If someone else's code is the target or the inventor of the hardware is targetted by name, I'd say it is

Nice of you to completely disregard stuff like this.

The patch was rejected because nobody agreed on it. The whole "it doesn't apply to previous commits" is a nice touch though.

Nothing has changed in Linux' development and nothing will change. But sure, keep circlejerking over the evil Jewish transexual communist sjw trying to destroy the world and shit.

I'm sure this is already a thing and there is a specific word for it but I'm not tech savvy so I don't know it. So here's the plan:

I'm at a client on a regulary basis. One of the offices I'm in when I'm there has some kinda hidden crawlspace that was created during recent renovations. Inside this this are power outlets (working) and network outlet (not working). They have a guest wifi and I know the password. I guess some inbound ports must be usable because people presenting some systems and stuff. My idea is now to setup a tiny server there that can host an imageboard. not for CP you hentai!

Is this a thing? Are there any others who have hidden servers? Are there any super tiny servers that don't make any noise? How do I hide it so it doesn't show up on any router? Any tipps?

Maybe you're just illiterate. Try starting with the Hardy Boys, when you're confrortable with those try some YA novels. Maybe try some adult literature if you're feeling bold. After that you should be well-situated to read an entry-level programming textbook

OPTIONS: -h : display this help and exit -q : set the encoding quality between 0 and 63, 0 is lossless, default is 30 -t : set the number of threads to use -f : do not prompt before overwritingEOF finish}